Archive for the ‘hacking’ Tag

.Onion Site: Berlusconi Market (Credit Cards, Hacking, AK47s, & Cocaine)

Monday, May 14th, 2018

.Onion Site: Berlusconi Market (Credit Cards, Hacking, AK47s, & Cocaine)

Berlusconi Market is a really cool market on the darkweb and they consist of vendors that sells all types of illegal goods and services you can think of. The great thing about this market is that they have a Monero escrow account or so it seems.
Now I have never bought anything from the darkweb but I have done enough research to know that Monero is the cryptocurrency you’ll want to use when you are placing orders on the darkweb, instead of bitcoin.

Monero has probably the best cryptographic guarantee of privacy, namely the untraceability of transactions, privacy of wallet balances and fungibility.

Read the rest of this entry »

.Onion Site: Dream Market (Darknet Website)

Thursday, July 13th, 2017

 

Before getting started, set a VPN and open your Tor browser. Copy and paste http://lchudifyeqm4ldjj.onion/ this link on Tor and press Enter. Now, you will be taken to the .onion domain which can be accessed only Tor browser.

UPDATED 5-14-2018 Here is the link http://2pjwzzms2yqlrkhp.onion/

It is simple and easy to register with Dream Market (Dream Market Link). It is a straightforward process. To complete the process, you need to pay attention for a couple of things. Here are the few. Read the rest of this entry »

Phreaking Dictionary: What is Phreaking

Wednesday, June 28th, 2017

/-/ Phreak Dictionary /-/

From The InFECTion Cook Book

Here you will find some of the basic but necessary terms that should be known by any phreak who wants to be respected at all.

Phreak : 1. The action of using mischevious and mostly illegal ways in order to not pay for some sort of tele- communications bill, order, transfer, or other service. It often involves usage of highly illegal boxes and machines in order to defeat the security that is set up to avoid this sort of happening. [fr’eaking]. v.

2. A person who uses the above methods of destruction and chaos in order to make a better life for all. A true phreaker will not not go against his fellows or narc on people who have ragged on him or do anything termed to be dishonorable to phreaks. [fr’eek]. n.

3. A certain code or dialup useful in the action of being a phreak. (Example: “I hacked a new metro phreak last night.”)

Switching System: 1. There are 3 main switching systems currently employed in the US, and a few other systems will be mentioned as background. Read the rest of this entry »

The Phishing Guide Part 2 : Man-in-The-Middle

Saturday, June 17th, 2017

For a Phishing attack to be successful, it must use a number of methods to trick the customer into doing something with their server and/or supplied page content. There are an ever increasing number of ways to do this. The most common methods are explained in detail below, will include:

Man-in-the-middle Attacks

• URL Obfuscation Attacks

• Cross-site Scripting Attacks

• Preset Session Attacks

• Observing Customer Data

• Client-side Vulnerability Exploitation

I will go into more deatil about others in anouther post but today we are going to learn how to do Man-in-the-Middle attack

Man-in-the-middle Attacks One of the most successful vectors for gaining control of customer information and resources is through man-in-the-middle attacks. In this class of attack, the attacker situates themselves between the customer and the real web-based application, and proxies all communications between the systems. From this vantage point, the attacker can observe and record all transactions. This form of attack is successful for both HTTP and HTTPS communications. The customer connects to the attackers server as if it was the real site, while the attackers server makes a simultaneous connection to the real site. The attackers server then proxies all communications between the customer and the real web-based application server – typically in real-time. In the case of secure HTTPS communications, an SSL connection is established between the customer and the attackers proxy (hence the attackers system can record all traffic in an unencrypted state), while the attackers proxy creates its own SSL connection between itself and the real server.

Read the rest of this entry »

Guide to Steal From ATMs in The 1990s

Friday, June 2nd, 2017

 

NOTE: There has been a few files written about how to ‘RIP OFF’ ATM’s of  some sort but this file will not contain technical shit on the card tracks or a xxxyyyooo17ss type of format. This text will tell you how to rip off ATM’s without all of that technical stuff that you can’t really use because most of the stuff are too hard. So I give you methods on how you can defeat ATM’s with things you may or may not need to pay a-lot for! This file is real unlike a file I came across that a user uploaded on Blitzkrieg called KRAD#1 which I feel was written by 10year olds. That file is totally SHIT! Now there was a-lot of Valid writers on the subject of ATM’s but I feel they were on the subject of PINs & PANs which is very hard to do right. Read the rest of this entry »

GUIDE TO (mostly) HARMLESS HACKING

Saturday, May 20th, 2017

GUIDE TO (mostly) HARMLESS HACKING

Beginners’ Series #2, Section 2.

Hacking into Windows 95 (and a little bit of NT lore)!
____________________________________________________________

Important warning: this is a beginners lesson. BEGINNERS. Will all you
geniuses who were born already knowing 32-bit Windows just skip reading this
one, OK? We don’t need to hear how disgusted you are that not everyone
already knows this.

PARENTAL DISCRETION ADVISED! Read the rest of this entry »